Essays about: "security IT"

Showing result 11 - 15 of 3455 essays containing the words security IT.

  1. 11. Two Different Parties Competing for Two Core Issues? : An Analysis of Liberal, Conservative and Nationalist Values and the Right Ideology in Sweden, 2018-2022

    University essay from Linnéuniversitetet/Institutionen för statsvetenskap (ST)

    Author : Olivia Pramchoobua Jakobsson; [2024]
    Keywords : Election Manifestos; Moderate Party; Sweden Democrats; Security and Immigration; Ideological Resemblance and Convergence; Liberalism; Conservatism; Nationalism; and Systematic Qualitative Analysis.;

    Abstract : This study aims to analyze whether an ideological resemblance has occurred between the Moderate Party and the Sweden Democrats during the electoral periods 2018 and 2022. As such, an ideology focused systematic qualitative analysis has been applied with the additional lens of ideal type Liberal, Conservative and Nationalist values. READ MORE

  2. 12. Israel, Russia and the US: A Strange Triangular Relationship : An analysis of an unexpected alliance and its rationality

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Alfred Lovnér; [2024]
    Keywords : International Relations; Political Influence; Security; Peace; Development;

    Abstract : The relationship between Israel and the US, as well as Israel and Russia are well documented, as it serves as a key aspect within the struggle for power and influence within the Middle East. However much research has been made on the topic, few have analysed how the relationship between Israel and the two others have affected the three, creating what could only be viewed as a blindspot within scholarship on the topic, as the relationships did not start in, nor are maintained within a vacuum. READ MORE

  3. 13. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  4. 14. Island of the Roses : A case study of the ontological threat of a micronation

    University essay from Försvarshögskolan

    Author : Lukas Gunnarson Hellerstedt; [2024]
    Keywords : ;

    Abstract : The discipline of OSS’s (Ontological Security Studies) incorporation in Security Studies has helped unravel state behaviour which other IR-theories (International Relations) have struggled to make sense of. Going beyond the physical security concerns which characterise the traditional literature, OSS has up until recently consistently emphasised the psychological threat of harm to the “self” – emanating from a point of departure which renders it disembodied. READ MORE

  5. 15. Climate Change, Water Management, and Human Rights: : A Comparative Study of India and Somalia, and Prospects for Legal Frameworks

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Oscar Behrmann; Ljungberg Elin; [2024]
    Keywords : Climate Justice; Climate Change; Human Rights; Sustainable Development; Climate Vulnerability; Environmental Justice; Security-Development nexus; Water scarcity; Water resource management; and International Law.;

    Abstract : Climate change is one of the most important issues in today's world. Its effect reaches beyond geographical borders and deeply connects to human welfare, rights, and possibilities. Climate change affects the climate and all other sectors of development in the world. READ MORE